Sciweavers

167 search results - page 31 / 34
» Inter-enterprise collaboration management in dynamic busines...
Sort
View
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
BPM
2009
Springer
157views Business» more  BPM 2009»
13 years 8 months ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
INTERSENSE
2006
ACM
14 years 1 months ago
Programming wireless sensor networks with logical neighborhoods
— Wireless sensor network (WSN) architectures often feature a (single) base station in charge of coordinating the application functionality. Although this assumption simplified ...
Luca Mottola, Gian Pietro Picco
INFOCOM
2006
IEEE
14 years 1 months ago
Backbone Topology Synthesis for Multi-Radio Meshed Wireless LANs
—Wireless local area network (WLAN) systems are widely implemented today to provide hot spot coverage. Operated typically in an infrastructure mode, each WLAN is managed by an ac...
Laura Huei-jiun Ju, Izhak Rubin
HICSS
2002
IEEE
169views Biometrics» more  HICSS 2002»
14 years 16 days ago
Enabling Technology for Personalizing Mobile Services
A major trend in the current information society is personalization, which is considered a key business enabler for mobile services because the mobile device is a personal assista...
Marc M. Lankhorst, Herma Van Kranenburg, Alfons H....